信息安全漏洞分析 3
Research on Parallel Vulnerabilities Discovery Based on Open Source Database and Text Mining 3
基于OWL本体的信息安全漏洞资源模型及应用 18
Analysis of Security Threats and Vulnerability for Cyber-physical Systems 29
光网络关键器件硬件安全性的探讨 44
基于架构驱动的网络渗透方法的研究 56
信息系统安全风险评估 67
A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain 67
A Scenario-Based Information Security Risk Evaluation Method 77
Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines 91
Research of the Measure Method of Identity Trustworthiness Based on Software Code Homology Detection 100
Test Cases Generation Assisted by Control Dependence Analysis 111
The Practical Risk Assessment for Enterprise Wireless Local Area Network 124
新技术新应用安全 139
Analysis on Password Protection in Android Applications 139
Cryptanalysis and Improvement of Certificateless Partially Blind Signature 150
Modelling Analysis and Auto Detection of Cryptographic Misuse in Android Applications 168
Provably Secure and Efficient Certificateless Signature in the Standard Model 186
Towards a Secure Android Software Protection System 201
Using Simulation Platform to Analyze Radio Modem Security in SCADA 217
基于信息熵的加密会话检测方法 230
工控网络协议Fuzzing测试技术研究综述 238
炼化行业工业控制系统信息安全分析 254
数据分析与处理 269
An Improved String Matching Algorithm for HTTP Data Reduction 269
ISEK : An Information Security Knowledge Graph for CISP Knowledge System 279
Program Crash Analysis Based on Taint Analysis 288
Research on Micro-blog Information Perception and Mining Platform 304
Research of Message Queues Stream Processing Method Based on Cloud Services 315